4.6 Article

LIGHT: Lightweight Authentication for Intra Embedded Integrated Electronic Systems

Journal

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING
Volume 20, Issue 2, Pages 1088-1103

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TDSC.2022.3148825

Keywords

Protocols; Authentication; Security; Hash functions; Embedded systems; Half-duplex system; Costs; Lightweight authentication; intra embedded systems; universal hash function; key exchange

Ask authors/readers for more resources

As embedded integrated electronic systems (EIESs) become more prevalent, the need for secure data exchange in such systems becomes crucial. Designing secure authentication protocols for different embedded systems with varying communication modes is a challenge. This paper presents a lightweight authenticated key-exchange (AKE) protocol for EIESs, designed for resource-constrained devices with minimal interactions. The protocol's security is proven, and a strategy for selecting security parameters based on empirical evaluations is provided. Efficiency analysis demonstrates effective deployment of the protocol in the EIESs environment.
As embedded integrated electronic systems (EIESs) become more pervasive (including in mission-critical applications), the need to ensure the security of data exchange in such a system against various malicious activities becomes more pronounced. However, designing secure and efficient solutions, such as authentication protocols, for the many different embedded systems with varying internal communication modes remains challenging. Therefore, in this paper, we propose a lightweight authenticated key-exchange (AKE) protocol for EIESs based on half-duplex and command/response bus. Specifically, the proposed protocol is designed to operate on resource-constrained devices, as well as having minimal number of interactions. We then prove the security of the proposed protocol and present the security parameter selection strategy for protocol implementation based on the empirical evaluations. Moreover, efficiency analysis also shows that the protocol can be effectively deployed in the EIESs environment.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available